Understanding Android-II (Kernel & HAL)

  1. A user-based permissions model
  2. Process isolation
  3. An extensible mechanism for secure IPC
  4. The ability to remove unnecessary and potentially insecure parts of the kernel
  1. Prevents user A from reading user B’s files
  2. Ensures that user A does not exhaust user B’s memory
  3. Ensures that user A does not exhaust user B’s CPU resources
  4. Ensures that user A does not exhaust user B’s devices (for example, telephony, GPS, and Bluetooth)

--

--

--

A computer enthusiast and a tech geek, looking towards the future as to become an intellect in Cyber Security and to excel in the industry with great passion.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Android Loopers and Handlers Demystified

Add an animated gif to your Android splash screen

Google delays next week’s Android 11 Beta release 2020: Why?

Dagger + Navigation: Single Activity App

DIY Gradle build optimization

Java Streams vs. Kotlin Sequences

Multiple Build Variants in Android with common source code

Jetpack Compose Stateful Composables, Explained

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Aasish Mithra

Aasish Mithra

A computer enthusiast and a tech geek, looking towards the future as to become an intellect in Cyber Security and to excel in the industry with great passion.

More from Medium

Mobile Forensics — Analyzing Snapseed on Android

FeignClients With KotlinCoroutines

Secure Coding

Sign In With Google, from zero to hero